{"id":"CVE-2019-3846","details":"A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.","modified":"2026-04-16T04:30:17.699989094Z","published":"2019-06-03T19:29:02.017Z","related":["SUSE-SU-2019:14127-1","SUSE-SU-2019:1527-1","SUSE-SU-2019:1529-1","SUSE-SU-2019:1530-1","SUSE-SU-2019:1532-1","SUSE-SU-2019:1533-1","SUSE-SU-2019:1534-1","SUSE-SU-2019:1535-1","SUSE-SU-2019:1536-1","SUSE-SU-2019:1550-1","SUSE-SU-2019:1581-1","SUSE-SU-2019:1588-1","SUSE-SU-2019:1668-1","SUSE-SU-2019:1671-1","SUSE-SU-2019:1674-1","SUSE-SU-2019:1692-1","SUSE-SU-2019:1765-1","SUSE-SU-2019:1882-1","SUSE-SU-2019:1948-1","SUSE-SU-2019:2430-1","SUSE-SU-2019:2450-1","SUSE-SU-2019:2821-1","openSUSE-SU-2019:1571-1","openSUSE-SU-2019:1579-1","openSUSE-SU-2024:10728-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190710-0002/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4094-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2741"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0174"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4093-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4095-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4465"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2703"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Jun/26"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4095-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4117-1/"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4118-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3055"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3076"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3089"},{"type":"FIX","url":"https://seclists.org/bugtraq/2019/Jul/33"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3846"},{"type":"EVIDENCE","url":"https://seclists.org/oss-sec/2019/q2/133"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"3.0"},{"fixed":"3.16.70"}]},{"events":[{"introduced":"3.17"},{"fixed":"4.4.186"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.186"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.134"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.59"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.1.18"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"9.5"}]},{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"42.3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-3846.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}